TY - GEN
T1 - Graph-based Method for Detecting Fraud Regarding Activity Relationships in Business Process Models
AU - Wardhiana, I. Nyoman Gde Artadana Mahaputra
AU - Anggraini, Ratih Nur Esti
AU - Sungkono, Kelly Rossa
N1 - Publisher Copyright:
© 2025 IEEE.
PY - 2025
Y1 - 2025
N2 - Process-Based Fraud (PBF) poses a threat to organizational integrity, resulting from deviations in the execution of business processes compared to established standard operating procedures (SOPs). Unlike transactional fraud, which targets financial discrepancies, PBF focuses on control-flow inconsistencies that may lead to unauthorized actions, policy violations, or operational inefficiencies. This study proposes a novel graph-based architecture for PBF detection using Neo4j, integrating three distinct graph-based methods: two similarity-based methods using Jaccard similarity and Levenshtein distance, and one logic-based method using PBF-type-specific rules. Embedded within a graph-native environment, this approach enables the detection of several underexplored PBF types, including skipped activities, wrong patterns, and wrong decisions. An experimental evaluation of 1,000 cases reveals that the graph-based method with Levenshtein distance achieves the best performance in detecting incorrect patterns, achieving perfect performance with an F1-score of 1.00. For wrong decision detection, the graph-based method with rule-based logic attained an F1-score of 1.00. In identifying skipped activities, both graph-based methods, using Jaccard and Levenshtein, achieved F1-scores of 0.98 at a similarity threshold of 1.0. These outcomes demonstrate that the proposed graph-based approach provides an effective solution for accurately detecting various types of process-based fraud in business process models.
AB - Process-Based Fraud (PBF) poses a threat to organizational integrity, resulting from deviations in the execution of business processes compared to established standard operating procedures (SOPs). Unlike transactional fraud, which targets financial discrepancies, PBF focuses on control-flow inconsistencies that may lead to unauthorized actions, policy violations, or operational inefficiencies. This study proposes a novel graph-based architecture for PBF detection using Neo4j, integrating three distinct graph-based methods: two similarity-based methods using Jaccard similarity and Levenshtein distance, and one logic-based method using PBF-type-specific rules. Embedded within a graph-native environment, this approach enables the detection of several underexplored PBF types, including skipped activities, wrong patterns, and wrong decisions. An experimental evaluation of 1,000 cases reveals that the graph-based method with Levenshtein distance achieves the best performance in detecting incorrect patterns, achieving perfect performance with an F1-score of 1.00. For wrong decision detection, the graph-based method with rule-based logic attained an F1-score of 1.00. In identifying skipped activities, both graph-based methods, using Jaccard and Levenshtein, achieved F1-scores of 0.98 at a similarity threshold of 1.0. These outcomes demonstrate that the proposed graph-based approach provides an effective solution for accurately detecting various types of process-based fraud in business process models.
KW - fraud detection
KW - graph
KW - jaccard similarity
KW - levenshtein distance
KW - process-based fraud
UR - https://www.scopus.com/pages/publications/105018079022
U2 - 10.1109/ICoDSA67155.2025.11157612
DO - 10.1109/ICoDSA67155.2025.11157612
M3 - Conference contribution
AN - SCOPUS:105018079022
T3 - 2025 International Conference on Data Science and Its Applications, ICoDSA 2025
SP - 1112
EP - 1117
BT - 2025 International Conference on Data Science and Its Applications, ICoDSA 2025
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 8th International Conference on Data Science and Its Applications, ICoDSA 2025
Y2 - 3 July 2025 through 5 July 2025
ER -